رکورد قبلیرکورد بعدی

" Computer crime, investigation, and the law / "


Document Type : BL
Record Number : 960300
Doc. No : b714670
Main Entry : Easttom, Chuck.
Title & Author : Computer crime, investigation, and the law /\ Chuck Easttom, Jeffrey Taylor.
Publication Statement : Boston, Mass. :: Course Technology PTR/Cengage Learning,, ©2011.
Page. NO : 1 online resource (xvii, 499 pages) :: illustrations
ISBN : 1435456106
: : 9781435456105
: 1435455320
: 9781435455320
Bibliographies/Indexes : Includes bibliographical references and index.
Contents : Computer crime -- Introduction to computer crime -- A history of computer crime in America -- United States computer laws part I -- United States computer laws part II -- Techniques and resources for computer crime -- Organized crime and cyber terrorism -- Computer forensics -- Observing, Collecting, Documenting, and Storing Electronic Evidence -- Collecting Evidence from Hardware -- Collecting Evidence from the Operating System -- Collecting Evidence from Other Sources -- Litigation -- Experts and Expert Reports -- Depositions and Trials -- Civil Matters Relating to Computer Crime -- Computer Crime and Individuals -- Protecting Children on the Internet -- How to Protect Your Identity on the Internet -- Harassment and Stalking Via the Computer -- Techniques -- Hacker Techniques -- How Cyber Criminals Communicate.
Abstract : "If any aspect of your work brings you into contact with computer crime, Computer Crime, Investigation, and the Law is for you. It begins with a broad introduction to the field of computer crime, discussing the history of computer crime, basic criminal techniques, and the relevant laws. Next, the book walks you through the essentials of computer forensics. Litigation is also explored, such as depositions, expert reports, trials, and even how one can select an appropriate expert witness. Lastly, the book introduces you to the specific techniques that hackers use and even shows you some of the tricks they use to infiltrate computer systems to help you defend against such attacks. This section of the book also includes a discussion of communication techniques used by computer criminals, with an overview of encryption, stenography, and hacker slang language. Computer Crime, Investigation, and the Law is your gateway into the world of investigating computer crimes"--Resource description page.
Subject : Computer crimes-- Investigation-- United States.
Subject : Computer crimes-- United States.
Subject : Computer security.
Subject : Internet-- Law and legislation-- United States.
Subject : Computer crimes-- Investigation.
Subject : Computer crimes-- Investigation.
Subject : Computer crimes-- Law and legislation.
Subject : Computer crimes.
Subject : Computer crimes.
Subject : Computer security.
Subject : Internet-- Law and legislation.
Subject : TRUE CRIME-- White Collar Crime.
Subject : United States.
Dewey Classification : ‭364.168‬
LC Classification : ‭HV6773.2‬‭.E17 2011eb‬
Added Entry : Taylor, Jeffrey.
کپی لینک

پیشنهاد خرید
پیوستها
Search result is zero
نظرسنجی
نظرسنجی منابع دیجیتال

1 - آیا از کیفیت منابع دیجیتال راضی هستید؟